archive a few unused modules
This commit is contained in:
parent
46f98a4be4
commit
36a0de496b
9 changed files with 1 additions and 7 deletions
|
|
@ -1,62 +0,0 @@
|
|||
{ config, pkgs, lib, ... }:
|
||||
|
||||
let
|
||||
cfg = config.services.dufs;
|
||||
authFile = "/etc/dufs-auth";
|
||||
in
|
||||
{
|
||||
options.services.dufs = {
|
||||
sharedPath = lib.mkOption {
|
||||
type = lib.types.nullOr lib.types.str;
|
||||
default = null;
|
||||
description = "Path to the folder to share via WebDAV. Set to null to disable dufs.";
|
||||
example = "/mnt/storage/shared";
|
||||
};
|
||||
|
||||
port = lib.mkOption {
|
||||
type = lib.types.port;
|
||||
default = 5099;
|
||||
description = "Port to listen on";
|
||||
};
|
||||
|
||||
user = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "root";
|
||||
description = "User account under which dufs runs";
|
||||
};
|
||||
|
||||
group = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "root";
|
||||
description = "Group under which dufs runs";
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf (cfg.sharedPath != null) {
|
||||
# Install dufs package
|
||||
environment.systemPackages = [ pkgs.dufs ];
|
||||
|
||||
# Create systemd service
|
||||
# NOTE: Authentication credentials must be manually created in /etc/dufs-auth
|
||||
# The file should contain a single line in format: username:password
|
||||
# Make sure to set permissions: chmod 600 /etc/dufs-auth
|
||||
systemd.services.dufs = {
|
||||
description = "Dufs WebDAV File Server";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
after = [ "network.target" ];
|
||||
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
User = cfg.user;
|
||||
Group = cfg.group;
|
||||
UMask = "0022";
|
||||
ExecStart = ''/bin/sh -c "${pkgs.dufs}/bin/dufs ${cfg.sharedPath} --port ${toString cfg.port} --bind 0.0.0.0 --allow-all --auth $(cat ${authFile})@/:rw"'';
|
||||
Restart = "on-failure";
|
||||
RestartSec = "10s";
|
||||
};
|
||||
};
|
||||
|
||||
# Open firewall port (optional, since traffic comes through WireGuard)
|
||||
# networking.firewall.allowedTCPPorts = [ cfg.port ];
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue